Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ClickFix in action: how fake captcha can encrypt an entire company

0
Medium
Published: Thu Feb 19 2026 (02/19/2026, 15:26:28 UTC)
Source: AlienVault OTX General

Description

The report details a malware attack on a large Polish organization involving fake CAPTCHA techniques. It describes the initial infection vector, where users were tricked into running malicious code through a Windows+R shortcut. The analysis covers two main malware families: Latrodectus (version 2.3) and Supper. The report provides technical details on the malware's functionality, communication protocols, and persistence mechanisms. It also includes indicators of compromise, such as C2 server IP addresses and file hashes. The authors emphasize the importance of employee education and monitoring for unusual events to mitigate such threats.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 18:16:54 UTC

Technical Analysis

This threat involves a malware campaign targeting a large Polish organization using a social engineering technique involving fake CAPTCHA prompts. Users are deceived into running malicious code through the Windows+R shortcut, which is an uncommon but effective infection vector. The malware campaign includes two main families: Latrodectus version 2.3 and Supper. Latrodectus is known for its sophisticated persistence mechanisms, including side-loading legitimate DLLs to evade detection, and uses advanced techniques such as process injection (T1055) and credential dumping (T1003). Supper complements Latrodectus by providing additional capabilities such as ransomware-like encryption of company data. Both malware families communicate with command and control (C2) servers using encrypted protocols (T1071.001) to receive commands and exfiltrate data. The campaign employs obfuscation (T1027) and masquerading (T1036.004) to avoid signature-based detection. Persistence is maintained through scheduled tasks (T1053.005) and registry modifications. The report includes technical indicators like C2 IP addresses and file hashes, which can be used for detection and response. The attack chain demonstrates a blend of social engineering, malware sophistication, and stealthy communication, making it a complex threat to detect and mitigate. The absence of known public exploits suggests this is a targeted campaign rather than widespread opportunistic malware. The report emphasizes the importance of employee training to recognize social engineering attempts and the need for continuous monitoring of unusual system and network activities to detect early signs of compromise.

Potential Impact

If successful, this malware campaign can lead to significant operational disruption through encryption of critical company data, effectively amounting to a ransomware attack. The compromise of credentials and persistent access allows attackers to move laterally within the network, increasing the risk of data exfiltration and further sabotage. Organizations may face downtime, loss of sensitive information, reputational damage, and financial costs related to incident response and recovery. The use of sophisticated evasion techniques complicates detection and remediation, potentially prolonging the attack lifecycle. Given the targeted nature and the use of social engineering, organizations with large user bases and complex IT environments are particularly at risk. The impact extends beyond confidentiality to integrity and availability of systems and data, making this a multi-dimensional threat. Failure to detect early signs may result in widespread encryption and operational paralysis. The medium severity rating reflects the balance between the attack complexity and the need for user interaction, but the potential consequences warrant serious attention.

Mitigation Recommendations

To mitigate this threat, organizations should implement a multi-layered defense strategy. First, conduct targeted employee training focused on recognizing social engineering tactics, especially fake CAPTCHA prompts and suspicious use of Windows+R commands. Deploy application whitelisting and restrict execution of unauthorized scripts or binaries launched via shortcut keys. Enhance endpoint detection and response (EDR) capabilities to identify behaviors such as side-loading, process injection, and unusual scheduled tasks. Network monitoring should include anomaly detection for encrypted C2 communications and unusual outbound connections to known malicious IP addresses. Regularly update and patch systems to reduce the attack surface, even though no specific patches are noted for this malware. Implement strict credential management policies and monitor for signs of credential dumping. Use threat intelligence feeds to incorporate the provided indicators of compromise into security tools for proactive detection. Conduct regular backups with offline storage to enable recovery from ransomware-like encryption. Finally, establish incident response plans that include rapid isolation and forensic analysis to contain infections early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cert.pl/posts/2026/02/fake-captcha-in-action"]
Adversary
null
Pulse Id
69972ba4edeee60b22933086
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash16afa928cd820a572bd47e798f481c46
hashe6133838440afc64ce9722343a1cb297
hashee901ff4ad552d0f8dc8fd5837ace5ab
hashfd817202314d4067c2dc9c51d98f0268
hash273962821f14982ead6c10823587fd39e89cf2fc
hash699cf845d7320c0a7c1407dbf8f73c9fdfb5c754
hashb5710067c36447759b82593200f7374760d71571
hashd1eccb3d907f0cd7e52d502b340624d5dc98f8dc
hash21b953dc06933a69bcb2e0ea2839b47288fc8f577e183c95a13fc3905061b4e6
hash2528df60e55f210a6396dd7740d76afe30d5e9e8684a5b8a02a63bdcb5041bfc
hash6673794376681c48ce4981b42e9293eee010d60ef6b100a3866c0abd571ea648
hashaf45a728552ccfdcd9435c40ace60a9354d7c1b52abf507a2f1cb371dada4fde
hashb7f8750851e70ec755343d322d7d81ea0fc1b12d4a1ab6a60e7c8605df4cd6a5
hashbe5bcdfc0dbe204001b071e8270bd6856ce6841c43338d8db914e045147b0e77
hash3d56542349180e144aa17230e99b7eb4a29b97ea

Ip

ValueDescriptionCopy
ip110.199.19.162
ip171.130.169.141
ip185.233.166.27
ip27.166.233.185
ip85.239.54.130

Url

ValueDescriptionCopy
urlhttp://jzluw.com/cdn-dynmedia-1.microsoft.com/is/n03ufh3k003jdhkg99fhhas/is/content/
urlhttp://naintn.com/amazoncdn.com/oeiich37874cj30dkk43885j10vj38h38jd/nrs/opn/ca/
urlhttps://fadoklismokley.com/work/
urlhttps://fadoklismokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=fadoklismokley.com
urlhttps://gasrobariokley.com/work/
urlhttps://gasrobariokley.com/work/?counter=0&type=1&guid=3B7FFFF7F331576B6FA3479BDF43&os=6&arch=1&username=JohnDoe&group=2201209746&ver=2.3&up=7&direction=gasrobariokley.com

Domain

ValueDescriptionCopy
domainfadoklismokley.com
domaingasrobariokley.com
domainjzluw.com
domainnaintn.com

Threat ID: 69974fe8d7880ec89b065be4

Added to database: 2/19/2026, 6:01:12 PM

Last enriched: 2/19/2026, 6:16:54 PM

Last updated: 4/4/2026, 6:20:26 AM

Views: 536

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses